More and more personal and household devices are connecting to the internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus cannot wait to spy on you through them.
Earlier this month, Petraeus mused about the emergence of an “Internet of Things” — that is, wired devices — at a summit for In-Q-Tel, the CIA’s venture capital firm. “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies,” Petraeus enthused, “particularly to their effect on clandestine tradecraft
All those new online devices are a treasure trove of data if you’re a “person of interest” to the spy community. Once upon a time, spies had to place a bug in your chandelier to hear your conversation. With the rise of the “smart home,” you’d be sending tagged, geolocated data that a spy agency can intercept in real time when you use the lighting app on your phone to adjust your living room’s ambiance.
The CIA has a lot of legal restrictions against spying on American citizens. But collecting ambient geolocation data from devices is a grayer area, especially after the 2008 carve-outs to the Foreign Intelligence Surveillance Act. Hardware manufacturers, it turns out, store a trove of geolocation data; and some legislators have grown alarmed at how easy it is for the government to track you through your phone or PlayStation.
Under construction by contractors with top-secret clearances, the blandly named Utah Data Center is being built for the National Security Agency. A project of immense secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its purpose: to intercept, decipher, analyze, and store vast swaths of the world’s communications as they zap down from satellites and zip through the underground and undersea cables of international, foreign, and domestic networks. The heavily fortified $2 billion center should be up and running in September 2013. Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital “pocket litter.” It is, in some measure, the realization of the “total information awareness” program created during the first term of the Bush administration—an effort that was killed by Congress in 2003 after it caused an outcry over its potential for invading Americans’ privacy.
But “this is more than just a data center,” says one senior intelligence official who until recently was involved with the program. The mammoth Bluffdale center will have another important and far more secret role that until now has gone unrevealed. It is also critical, he says, for breaking codes. And code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents, confidential personal communications—will be heavily encrypted. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the US. The upshot, according to this official: “Everybody’s a target; everybody with communication is a target.”
Ever complain on Facebook that you were feeling “sick?” Told your friends to “watch” a certain TV show? Left a comment on a media website about government “pork?”
If you did any of those things, or tweeted about your recent vacation in “Mexico” or a shopping trip to “Target,” the Department of Homeland Security may have noticed.
In the latest revelation of how the federal government is monitoring social media and online news outlets, the Electronic Privacy Information Center has posted online a 2011 Department of Homeland Security manual that includes hundreds of key words (such as those above) and search terms used to detect possible terrorism, unfolding natural disasters and public health threats. The center, a privacy watchdog group, filed a Freedom of Information Act request and then sued to obtain the release of the documents.
The 39-page “Analyst’s Desktop Binder” used by the department’s National Operations Center includes no-brainer words like “”attack,” “epidemic” and “Al Qaeda” (with various spellings). But the list also includes words that can be interpreted as either menacing or innocent depending on the context, such as “exercise,” “drill,” “wave,” “initiative,” “relief” and “organization.”
Deadly attacks on Iranian nuclear scientists are being carried out by an Iranian dissident group that is financed, trained and armed by Israel’s secret service, U.S. officials tell NBC News, confirming charges leveled by Iran’s leaders.
The group, the People’s Mujahedin of Iran, has long been designated as a terrorist group by the United States, accused of killing American servicemen and contractors in the 1970s and supporting the takeover of the U.S. Embassy in Tehran before breaking with the Iranian mullahs in 1980.
The attacks, which have killed five Iranian nuclear scientists since 2007 and may have destroyed a missile research and development site, have been carried out in dramatic fashion, with motorcycle-borne assailants often attaching small magnetic bombs to the exterior of the victims’ cars.
Of course she never bothered to read the actual “Patriot Act” and it’s many addendums and add on’s, and Executive order’s. Which have generally turned this country into an electronic police state, but hey it had the word “Patriot” in it, so it’s gotta be patriotic right? Ah whatever I’ll tow the line so i can get re-elected.